Results 51 to 60 of about 584,673 (292)
Gun possession among American youth: a discovery-based approach to understand gun violence. [PDF]
OBJECTIVE: To apply discovery-based computational methods to nationally representative data from the Centers for Disease Control and Preventions' Youth Risk Behavior Surveillance System to better understand and visualize the behavioral factors associated
Kelly V Ruggles, Sonali Rajan
doaj +1 more source
Putting it All Together: Agreement, Incorporation, Coordination and External Possession in Wubuy (Australia) [PDF]
In this paper we examine the interaction of a number of grammatical phenomena in Wubuy, a polysynthetic language from northern Australia, and show how they can be given a comprehensive analysis within the framework of LFG. While each of these phenomena ?
Baker, B +3 more
core +1 more source
The newfound relationship between extrachromosomal DNAs and excised signal circles
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley +1 more source
Plain language summary The Family Planning (FP) Program is a national method of controlling population growth rates while improving maternal and child health. Indonesia, as one of the largest countries, has abysmally low contraceptive coverage.
Achmad Kemal Harzif +3 more
doaj +1 more source
In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka +11 more
wiley +1 more source
We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity.
A. Ambainis +10 more
core +1 more source
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee +3 more
wiley +1 more source
DBT-PDP: Provable data possession with outsourced data batch transfer based on blockchain
In the scenario of large-scale data ownership transactions, existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communication, which greatly affects their ...
Chengming Yi +3 more
doaj +1 more source
New provable data transfer from provable data possession and deletion for secure cloud storage
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu +3 more
doaj +1 more source
The Use of Apostrophes in Theses of English Students at the University of Bengkulu
The purposes of this study were to find out the functions of apostrophes used in the students’ theses and to identify the quality of students’ understanding in using apostrophes.
Rilda Apriananda Arimbi +2 more
doaj +1 more source

